Security and Safety Flashcards
Technology can lead to the following behavioural risks
- Sedentary lifestyle. Often results to too little time for physical activities
- Psychological development. Several psychological mental health concerns such as poor self-confidence, anxiety, depression, low and emotional stability and even lower life satisfaction
- Social interaction. Often resist face-to-face interaction with others and this may hinder social skill development or even cause social withdrawal
-
What is a malware
It is a malicious software that can delete or corrupt files and gather personal information
What is a computer virus
It is a malicious computer code that, reproduces itself on the same computer
What is a worm (network virus)
It is a type of malware that attempts to spread. It uses computer networks to replicate and then takes advantage of a vulnerability on the host computer. Once the worm has exploited that vulnerability on the system it immediately searches for another computer on the network that is the same vulnerability
What is a computer trojan
It is a malware that hides inside another program, masking itself as performing a safe activity but is also malicious. When it is installed it scans the system for credit card numbers and passwords, connects through the network to a remote system and then transmit that information to the attacker
Why is it not safe to connect to public Wi-Fi networks
Because these networks are rarely protected
What is a digital certificate
It’s a technology used to verify a user’s identity and key that has been signed by a trusted third party
Authentication
Is the process of ensuring that the person requesting access to a computer or other resources is authentic and not an imposter
What is a ransomware
Prevents a users device from properly and fully functioning until a fee is paid
Places you can recycle electronics include
- Device manufacturers
- Community recycling centers
- Some hardware and electronics stores
Name the ergonomic guidelines to technology use
- Proper physical alignment by using the right chair
Computer vision syndrome
Dry eyes, headaches, blurred or double vision
What is encryption
It encodes a file, folder or drive to effectively scramble the data so that unauthorised users cannot read it
What is address spoofing
Makes an email address or IP address appear legitimate by masking it’s true destination
An __ defines who can access a network or device, when they can access it, and by what actions they can take
Access control